...

Reclaiming cybersecurity The Global State of Information Security® Survey 2016 – Singapore highlights

by user

on
Category: Documents
31

views

Report

Comments

Transcript

Reclaiming cybersecurity The Global State of Information Security® Survey 2016 – Singapore highlights
www.pwc.com/sg
Reclaiming
cybersecurity
The Global State of Information Security®
Survey 2016 – Singapore highlights
Cyber-threats intensified in the
past year
Many executives are declaring cyber as the risk that will define our
generation. This publication highlights some of the key findings
from our global report, a joint effort with CIO and CSO, The Global
State of Information Security® Survey 2016. It includes local figures
based on responses by participants in Singapore, and some food
for thought for management to strengthen their organisations’
cyber resilience.
The numbers have become numbing. Year after year, cyber-attacks continue
to escalate in frequency, severity and impact. The total number of security
incidents detected by respondents globally saw an increase of 38% this year.
Here are some facts and figures, revealed by our survey findings, on security
incidents over the past year.
Global average
Security incidents in 2015
Some of today’s most
significant business trends
– the explosion of data
analytics, the digitisation
of business functions, and
the increasingly borderless
and interconnected digital
platforms, to name a few –
have expanded the usage of
technologies and data, and
are creating more risk than
ever before.
– Vincent Loy
Financial Crime and Cyber Leader
PwC Singapore
2
More security
incidents were
detected in 2015
than in 2014
38%
56%
Increase in
theft of “hard”
intellectual
property
(e.g., strategic
business plans,
etc.) in 2015
*Most common areas where
50
security incidents occured (%)
38
35
32
28
14
14
8
Mobile device
(e.g., smartphone,
tablet computer)
exploited
Third-party
partner
or vendor
exploited
32
Operational
technology
(e.g., industrial
control, plant
manufacturing)
system exploited
8
Embedded
system
exploited
Consumer
technology
(e.g., webcam,
home automation,
etc.) exploited
2014
2015
*Likely sources of security incidents (%)
35
43
12
Current
employees
16
34
Suppliers/business
partners
22%
Global average
26
26
29
Current service providers/
consultants/contractors
Hackers
while employees remain the most cited source of
compromise, incidents attributed to business partners
percentage has climbed.
*Areas where businesses have been compromised (%)
16
Customer records compromised
26
22
Loss or damage of internal records
25
Employee records compromised
Theft of “soft” intellectual property (e.g.,
processes, institutional knowledge, etc.)
25
Theft of “hard” intellectual property (e.g.,
strategic business plans, deal documents,
sensitive financial documents, etc.)
12
31
29
29
14
Financial losses
17
14
14
Brand/ reputation compromised
16
14
Loss of customers
Legal exposure / lawsuit
34
6
11
2014
2015
*2015 Estimated total financial losses as a result
of all security incidents
17%
33%
$10,000 to $49,999
$50,000 to $99,999
$100,000 to $499,999
33%
Do not know
17%
*Singapore average
Reclaiming cybersecurity
3
Turnaround and transformation
in cybersecurity
As threats continue to mount, understanding and managing cybersecurity
risks have become top of mind for leaders in business and government.
Increasingly, they are adopting innovative technologies like cloud-enabled
cybersecurity, big data analytics and advanced authentication to reduce cyberrisks and improve cybersecurity programmes.
Businesses are also embracing a more collaborative approach to cybersecurity,
one in which intelligence on threats and response techniques is shared
with external partners. Internally, organisations are rethinking the roles
of key executives and the Board of Directors to help create more resilient
and proactive security capabilities. Here’s a snapshot of how businesses are
investing in cybersecurity and taking measures to manage cyber-risks.
*Security safeguards businesses are investing in to defend
against evolving cyber-risks
Threat assessments
Active monitoring/analysis of
information security intelligence
(e.g., vulnerability reports, log files)
Employee security awareness
training programme
The ‘bare minimum’
is ineffective against
increasingly adept assaults.
Businesses need to rethink
their cybersecurity
practices and focus on
innovative technologies
that can help reduce risks.
The advantage will go to
companies who have the
right data, understand
data and know how to take
active steps in putting the
information into good use
– Tan Shong Ye
IT & Data Risk Leader
PwC Singapore
4
Employ Chief Information Security Officer
(CISO) in charge of the security programme
Security strategy for social media
Require our employees to complete
training on privacy policy and practices
Established security baselines/
standards for external partners/
customers/suppliers/vendors
Overall information security strategy
56%
61%
63%
68%
71%
73%
76%
81%
*Greater Board participation in information security
59%
45%
Security budget
34%
20%
Review roles and responsibilities
of security organisation
57%
29%
Security policies
36%
26%
Security technologies
32%
26%
Review of current security
and privacy risks
30%
16%
Review of security and
privacy testing
*Singapore average
2014
2015
Reclaiming cybersecurity
5
Leadership in achieving cyber resilience:
Setting the proper tone and structure
Cybersecurity needs to be an intrinsic part of any organisation. To protect
their organisations’ bottom line, reputation, brand and intellectual property,
the executive team needs to take ownership of cyber risk. Market leaders
are transforming their organisations from ones that are centered on security
and technology to ones that combine these with business management, risk
disciplines and cyber threat expertise. We recommend executive management
take the following steps to build cyber resilience within their organisation:
1. Establish cyber risk governance
The foundation of a strong cyber resilient organisation is a governance
framework for managing cyber risks. This is established by deciding who will
be on each of the teams, and setting up operating processes and a reporting
structure. Connections should also be made to other risk programmes such as
disaster recovery, business continuity, and crisis management.
2. Understand your cyber organisational boundary
An organisation’s cyber vulnerabilities extend to all locations where its data
is stored, transmitted, and accessed – by employees themselves, its trusted
partners, and its customers. Organisations should also consider new areas
such as big data, analytics, and social media.
3. Identify your critical business processes and assets
Organisations should determine what comprises their most valuable revenue
streams, business processes, assets, and facilities. We refer to these collectively
as “crown jewels.” After these are identified, understand where they are
located and who has access to them.
4. Identify cyber threats
Effective cyber risk monitoring focuses on building a sustainable and resilient
approach to putting intelligence inputs from various teams under a common
lens to quickly correlate threats in real time. Organisations should establish
a robust threat-analysis capability built on shared intelligence, data, and
research from internal and external sources.
5. Improve your collection, analysis, and reporting of information
Organisations should ensure their cyber risk operations team supports three
primary functions to build robust cyber and technical threat intelligence
capabilities. These are: collection and management, processing and analyzing,
and reporting and action.
6. Plan and respond
The development of prepared responses – playbooks – is a necessary step
in adequately planning and preparing responses to cyber events. Using the
intelligence gathered throughout the playbook development process, each
playbook says who should take action, what their responsibilities are, and
exactly what they should do. Executive management should also frequently
revisit cyber intelligence gathering techniques, leverage and update cyber
insurance options, and upgrade cyber security technologies.
6
The 'cyber' challenge for
companies over the next
12 months is two-fold:
(1) How to prioritise
investments allocated
to cybersecurity
(2) Finding the right
balance between
technologies, process
and people.
– Jimmy Sng
Partner
PwC South East Asia Consulting
Beyond the basics - Reclaiming
cybersecurity through innovation
As technologies evolve and adversaries sharpen their skills, how can
businesses anticipate the risks of tomorrow? Here are some innovative
approaches that organisations can consider:
Leverage on Big Data analytics
A data-driven approach can shift security away from perimeter-based defenses
and enable organisations to put real-time information to use in ways that can
help predict security incidents. It enables companies to better understand
anomalous network activity, and to quickly identify and respond to security
incidents.
Harness the power of cloud-enabled cybersecurity
Cloud computing has emerged as a sophisticated tool as cloud providers
steadily invested in advanced technologies for data protection, privacy,
network security and identity and access management. Many also have added
capabilities that enable them to improve intelligence gathering and threat
modeling, better block attacks, enhance collective learning and accelerate
incident response.
Partnering up to sharpen cybersecurity intelligence
As businesses share more data with an expanding roster of partners
and customers, it makes sense that they also would swap intelligence
on cybersecurity threats and responses. External collaboration allows
organisations to share and receive more actionable information from industry
peers, as well as Information Sharing and Analysis Centers (ISACs).
Insure what which cannot be protected
By now, it seems clear that technically adept adversaries will always find new
ways to circumvent cybersecurity safeguards. Today, first-party insurance
products cover data destruction, denial of service attacks, theft and extortion;
they also may include incident response and remediation, investigation and
cybersecurity audit expenses. Other key areas of coverage include privacy
notifications, crisis management, forensic investigations, data restoration and
business interruption.
Reclaiming cybersecurity
7
Our Cyber-risk team
Vincent Loy
Financial Crime and Cyber Leader
+65 6236 7498
[email protected]
Kyra Mattar
Director
+65 6236 3850
[email protected]
Tan Shong Ye
IT & Data Risk Leader
+65 6236 3262
[email protected]
Bahgya Perera
Director
+65 6236 7270
[email protected]
Jimmy Sng
Partner
+65 6236 3808
[email protected]
Maggie Leong
Senior Manager
+65 6236 3765
[email protected]
PwC insights on cybersecurity
As the number and sophistication of cyber-attacks increases, prevention, detection methods and cybersecurity
innovation are on the rise as forward-leaning business leaders focus on solutions that reduce cybersecurity risks and
improve performance. In this report, we’ll show you how innovative businesses are going about this challenge, and
how these efforts connect and intersect in ways that enable them to implement an integrated approach to protecting
assets, reputation as well as competitive advantages.
The Global State of Information Security® Survey 2016 is a worldwide study by PwC, CIO, and CSO. The results
discussed in this report are based on responses of more than 10,000 CEOs, CFOs, CIOs, CISOs, CSOs, VPs, and
directors of IT and security practices from 127 countries.
At PwC, our purpose is to build trust in society and solve important problems. We’re a network of firms in 157 countries
with more than 208,000 people who are committed to delivering quality in assurance, advisory and tax services.
Find out more and tell us what matters to you by visiting us at www.pwc.com/sg.
Scan the QR code below to read the full report
© 2015 PwC. All rights reserved.
Fly UP